, Conditions d'évaluation au niveau national

, 93 6.2.2 Sélection du degré de régression polynomiale, p.93

. .. , Scénarios de division des mesures, p.95

. .. Fonctions-d'estimation,

, 100 6.4.1 Division apprentissage/vérification et degré de régression polynomiale

. .. Choix-du-consensus, , p.101

, Estimation des intersections par une méthode de type Monte-Carlo

, Présentation des résultats au niveau mondial . . 105 6.5.1 Fonctions d'estimation

, Aspect méthodologique pour l'utilisation des techniques

. .. Aspect, 111 6.6.2 Effet du nombre de points de repère, p.112

. .. Granularité-de-la-cible, , p.113

. .. Quelle-technique-adopter-?, , p.114

. Bibliographie,

P. Mell and T. Grance, The NIST Definition of Cloud Computing

Y. Mansouri, A. N. Toosi, and R. Buyya, Data Storage Management in Cloud Environments : Taxonomy, Survey, and Future Directions, vol.50

P. Patel, A. Ranabahu, and A. Sheth, Service Level Agreement in Cloud Computing

, SLA"), Service Level Agreement

, Missouri tornado destroys hospital data center

J. Eng, Four Lightning Strikes in Belgium Erase Google Customer Data

B. Gellman and A. Soltani, NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say

, Available : https

-. R. Text, 4943 -115th Congress, 2017.

, Censorship of Google Sites in China | GreatFire Analyzer

G. Pallis and A. Vakali, Insight and Perspectives for Content Delivery Networks, vol.49, pp.101-106

, The Digital Universe Driving Data Growth in Healthcare

. Available,

, Code de la santé publique -Article L1111-8

, Décret n°2018-137 du 26 février 2018 relatif à l'hébergement de données de santé à caractère personnel

, 27 avril 2016 relatif à la protection des personnes physiques à l'égard du traitement des données à caractère personnel et à la libre circulation de ces données, et abrogeant la directive 95/46/ce (règlement général sur la protection des données) (texte présentant de l'intérêt pour l'eee), 2012.

. Available,

, on Amending Some Legislative Acts of the Russian Federation in as Much as It Concerns Updating the Procedure for Personal Data Processing in Information-Telecommunication Networks (with Amendments and Additions, 2014.

, Notice of the People's Bank of China on Urging Banking Financial Institutions to Do a Good Job in Protecting Personal Financial Information

, Provisions on Protecting the Personal Information of Telecommunications and Internet Users

. Available,

, Law of the People's Republic of China on Guarding State Secrets

, TPM 2.0 Library Specification

, TPM 1.2 Main Specification

C. Krauß and V. Fusenig, Using Trusted Platform Modules for Location Assurance in Cloud Networking," in Network and System Security, ser. Lecture Notes in Computer Science, pp.109-121

A. Albeshri, C. Boyd, and J. G. Nieto, GeoProof : Proofs of Geographic Location for Cloud Computing Environment, Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference On, pp.506-514

G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan et al., Remote data checking using provable data possession, vol.14, p.12

N. Paladi, M. Aslam, and C. Gehrmann, Trusted Geolocation-Aware Data Placement in Infrastructure Clouds, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp.352-360

N. Santos, R. Rodrigues, K. P. Gummadi, and S. Saroiu, Policy-sealed Data : A New Abstraction for Building Trusted Cloud Services, Proceedings of the 21st USENIX Conference on Security Symposium, ser. Security'12. USENIX Association, pp.10-10

L. Chen and D. B. Hoang, Addressing Data and User Mobility Challenges in the Cloud, 2013 IEEE Sixth International Conference on Cloud Computing, pp.549-556

S. Betgé-brezetz, G. B. Kamga, M. P. Dupont, and A. Guesmi, Privacy Control in Cloud VM File Systems, Cloud Computing Technology and Science (CloudCom), vol.2, pp.276-280, 2013.

T. Wüchner, S. Müller, and R. Fischer, Compliance-Preserving Cloud Storage Federation Based on Data-Driven Usage Control, Cloud Computing Technology and Science (CloudCom), vol.2, pp.285-288, 2013.

P. Massonet, S. Naqvi, C. Ponsard, J. Latanicki, B. Rochwerger et al., A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures, Parallel and Distributed Processing Workshops and Phd Forum, pp.1510-1517

N. O. Tippenhauer, C. Pöpper, K. B. Rasmussen, and S. Capkun, On the Requirements for Successful GPS Spoofing Attacks, Proceedings of the 18th ACM Conference on Computer and Communications Security, ser. CCS '11. ACM, pp.75-86

P. Choi and D. K. Kim, Design of security enhanced TPM chip against invasive physical attacks, 2012 IEEE International Symposium on Circuits and Systems, pp.1787-1790

, TPM Vulnerabilities to Power Analysis and An Exposed Exploit to Bitlocker

A. V. Markelova, Vulnerability of RSA Algorithm, pp.74-78

M. Irain, J. Jorda, and Z. Mammeri, Landmark-based data location verification in the cloud : Review of approaches and challenges, vol.6, p.31

, On the Vulnerabilities of Landmark-Based Data Location Approaches : Threats, Solutions, and Challenges, 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), pp.127-134

B. Biswal, S. Shetty, and T. Rogers, Enhanced learning classifier to locate data in cloud data centres, vol.4, p.141

T. Ries, V. Fusenig, C. Vilbois, and T. Engel, Verification of Data Location in Cloud Networking, 2011 Fourth IEEE International Conference on Utility and Cloud Computing, pp.439-444

M. Fotouhi, A. Anand, and R. Hasan, PLAG : Practical Landmark Allocation for Cloud Geolocation, IEEE 8th International Conference On, pp.1103-1106, 2015.

C. Jaiswal and V. Kumar, IGOD : Identification of geolocation of cloud datacenters, pp.85-102

K. Benson, R. Dowsley, and H. Shacham, Do You Know Where Your Cloud Files Are, Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, ser. CCSW '11. ACM, pp.73-82

M. Gondree and Z. N. Peterson, Geolocation of Data in the Cloud, Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ser. CODASPY '13. ACM, pp.25-36

,

G. J. Watson, R. Safavi-naini, M. Alimomeni, M. E. Locasto, and S. Narayan, LoSt : Location Based Storage, Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop, ser. CCSW '12. ACM, pp.59-70

M. Eskandari, A. S. Oliveira, and B. Crispo, VLOC : An Approach to Verify the Physical Location of a Virtual Machine In Cloud, Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference On, pp.86-94

B. Gueye, A. Ziviani, M. Crovella, and S. Fdida, Constraint-Based Geolocation of Internet Hosts, vol.14, pp.1219-1232
URL : https://hal.archives-ouvertes.fr/hal-01520105

F. Dabek, R. Cox, F. Kaashoek, and R. Morris, Vivaldi : A Decentralized Network Coordinate System, Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ser. SIGCOMM '04. ACM, pp.15-26

Y. Chen, Y. Xiong, X. Shi, B. Deng, and X. Li, Pharos : A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction, IEEE GLOBECOM 2007 -IEEE Global Telecommunications Conference, pp.421-426

Y. Chen, X. Wang, X. Song, E. K. Lua, C. Shi et al., Phoenix : Towards an Accurate, Practical and Decentralized Network Coordinate System, NETWORKING 2009, ser. Lecture Notes in Computer Science, pp.313-325

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner et al., Provable Data Possession at Untrusted Stores, Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS '07. ACM, pp.598-609

,

B. Chun, D. Culler, T. Roscoe, A. Bavier, L. Peterson et al., PlanetLab : An Overlay Testbed for Broadcoverage Services, vol.33, pp.3-12

A. Saied, R. E. Overill, and T. Radzik, Detection of known and unknown DDoS attacks using Artificial Neural Networks, vol.172, pp.385-393

M. Shtern, B. Simmons, M. Smit, and M. Litoiu, An architecture for overlaying private clouds on public providers, 2012 8th International Conference on Network and Service Management (Cnsm) and 2012 Workshop on Systems Virtualiztion Management (Svm), pp.371-377

R. Lee and B. Jeng, Load-Balancing Tactics in Cloud, 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp.447-454

, Internet Protocol

F. Poletti, N. V. Wheeler, M. N. Petrovich, N. Baddela, E. Fokoua et al., Towards high-capacity fibre-optic communications at the speed of light in vacuum, vol.7, pp.279-284

M. Irain, Z. Mammeri, and J. Jorda, Assessment of Regression-based Techniques for Data Location Verification at Country-Level (Invited Paper), 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM), pp.1-6

. Grid5000,

, Amazon Web Services (AWS) -Cloud Computing Services

. Renater,

L. Wenwei, Z. Dafang, Y. Jinmin, and X. Gaogang, On evaluating the differences of TCP and ICMP in network measurement, vol.30, pp.428-439

D. S. Alves and K. Obraczka, An Empirical Characterization of Internet Round-Trip Times, Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks, ser. Q2SWinet '17. ACM, pp.23-30

, PlanetLab | An open platform for developing, deploying, and accessing planetary-scale services

, Amazon Elastic Compute Cloud (EC2)

. Aws-global-cloud-infrastructure,

G. Wang and T. S. Ng, The Impact of Virtualization on Network Performance of Amazon EC2 Data Center, 2010 Proceedings IEEE INFOCOM, pp.1-9

I. Bermudez, S. Traverso, M. Mellia, and M. Munafò, Exploring the cloud from passive measurements : The Amazon AWS case, 2013 Proceedings IEEE INFOCOM, pp.230-234

C. Raiciu, M. Ionescu, and D. Niculescu, Opening Up Black Box Networks with CloudTalk

Q. Jacquemart, A. B. Vitali, and G. Urvoy-keller, Measuring the Amazon Web Services (AWS) WAN Infrastructure
URL : https://hal.archives-ouvertes.fr/hal-02128052

, The Shapely User Manual -Shapely 1.7a2 documentation

E. Westra, Python Geospatial Analysis Essentials : Process, Analyze, and Display Geospatial Data Using Python Libraries and Related Tools, ser. Community Experience Distilled